Sciweavers

SAC
2004
ACM
14 years 6 months ago
Boundary extraction in thermal images by edge map
Extracting object boundaries in thermal images is a challenging task because of the amorphous nature of the images and the lack of sharp boundaries. Classical edge-based segmentat...
Quming Zhou, Zhuojing Li, Jake K. Aggarwal
SAC
2004
ACM
14 years 6 months ago
A decision-theoretic approach for designing proactive communication in multi-agent teamwork
Techniques that support effective communication during teamwork processes are of particular importance. Psychological study shows that an effective team often can anticipate infor...
Yu Zhang, Richard A. Volz, Thomas R. Ioerger, John...
SAC
2004
ACM
14 years 6 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
SAC
2004
ACM
14 years 6 months ago
Information requirements engineering for data warehouse systems
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Based on interviews with projec...
Robert Winter, Bernhard Strauch
SAC
2004
ACM
14 years 6 months ago
A study into the usability of e-encyclopaedias
This paper describes a usability study performed on three different e-encyclopaedias, all of which were available on the web, contained similar content and targeted similar audien...
Ruth Wilson, Julie Shortreed, Monica Landoni
SAC
2004
ACM
14 years 6 months ago
Combining analysis and synthesis in a model of a biological cell
for ideas, and then abstract away from these ideas to produce algorithmic processes that can create problem solutions in a bottom-up manner. We have previously described a top-dow...
Ken Webb, Tony White
SAC
2004
ACM
14 years 6 months ago
Guiding motif discovery by iterative pattern refinement
In this paper, we demonstrate that the performance of a motif discovery algorithm can be significantly improved by embedding it into a novel framework that effectively guides the ...
Zhiping Wang, Mehmet M. Dalkilic, Sun Kim
SAC
2004
ACM
14 years 6 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
SAC
2004
ACM
14 years 6 months ago
Tucupi: a flexible workflow system based on overridable constraints
Jacques Wainer, Fábio de Lima Bezerra, Paul...
SAC
2004
ACM
14 years 6 months ago
RED with Dynamic Thresholds for improved fairness
Vladimir Vukadinovic, Ljiljana Trajkovic